Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.


Russians Hack FBI Communications System

The FBI and other law enforcement agencies want to have “backdoors” installed in all encrypted files and messages online. That is so the law enforcement agencies can spy on everyone and (hopefully) identify criminals. Of course, if this happens, everyone will depend upon the FBI and other law enforcement agencies to keep the information they find secret and safe from hackers, foreign governments, and other evil-doers world wide. That seems […]

Continue Reading →

IBM team is Building Encryption Methods that will be Safe from Quantum Computing

With computing power increasing faster than ever before, it’s possible to crack previously secure encryption, and with the advent of quantum computing, that possibility gets ever closer. (See for the details.) However, a collaborative effort among computer scientists and academics to safeguard data is winning attention. The goal is to create encryption methodologies that cannot be broken by quantum computing. Details may be found in an article by Nancy […]

Continue Reading →

The Myth of Consumer-Grade Security

From an article by security expert Bruce Schneier: The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that’s not possible, because there is no longer any difference between those categories of devices. Consumer devices are critical infrastructure. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement. The […]

Continue Reading →

Chinese Agencies ‘Crack Telegram’

If you are using Telegram, the supposedly secure messaging platform, you might want to read an article by Zak Doffman in the Forbes web site. It seems that Chinese authorities have managed to decode cell phone numbers from the (poorly) encrypted Telegram text messages and can at least see who is sending and receiving text messages. This is obviously a huge problem for those Telegram users who are using the […]

Continue Reading →

A Quote about the Lack of Privacy in Encryption Back Doors

  “There is no such thing as a back door (or in this case, online surveillance tool) that can only be used by the good guys. The Shadow Brokers hack and the resulting WannaCry attack show what can happen when hackers get their hands on such tools. By forcing all Kazakh citizens to use the same certificate, the government is introducing a significant vulnerability. If hackers were able to get […]

Continue Reading →

Did Facebook End The Encryption Debate?

The ability of encryption to shield a user’s communications rests upon the assumption that the sender and recipient’s devices are themselves secure, with the encrypted channel the only weak point… [But] Facebook announced earlier this year preliminary results from its efforts to move a global mass surveillance infrastructure directly onto users’ devices where it can bypass the protections of end-to-end encryption. In Facebook’s vision, the actual end-to-end encryption client itself […]

Continue Reading →

Cryptomator – The Easy Way to Securely Save Encrypted Files in Your Computer(s) and in the Cloud

If you want to keep a few secret documents or even applications, you need to encrypt them and hide them in your computer. If you have more than one computer (desktop, laptop, tablet, smartphone, etc.), you probably should have these secret, encrypted files automatically available on each computer and do that in such a manner that everything remains securely encrypted when copied to the other system(s). Even if you only […]

Continue Reading →